{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","type":"deb","namespace":"debian","name":"xen","version":"4.1.3-5","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"4.1.3-6","latest_non_vulnerable_version":"4.20.2+7-g1badcf5035-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3905?format=json","vulnerability_id":"VCID-2534-cu4k-x3fs","summary":"XENMEM_exchange may overwrite hypervisor memory","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1540.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1540.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5513.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5513.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5513","reference_id":"","reference_type":"","scores":[{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.33998","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34257","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34524","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34537","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34523","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.33879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.33949","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5513"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513"},{"reference_url":"http://secunia.com/advisories/51397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51397"},{"reference_url":"http://secunia.com/advisories/51468","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51468"},{"reference_url":"http://secunia.com/advisories/51486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51486"},{"reference_url":"http://secunia.com/advisories/51487","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51487"},{"reference_url":"http://secunia.com/advisories/51495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51495"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80482","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80482"},{"reference_url":"http://support.citrix.com/article/CTX135777","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX135777"},{"reference_url":"http://www.debian.org/security/2012/dsa-2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2582"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/03/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/03/11"},{"reference_url":"http://www.osvdb.org/88131","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/88131"},{"reference_url":"http://www.securityfocus.com/bid/56797","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56797"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=877391","reference_id":"877391","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=877391"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5513","reference_id":"CVE-2012-5513","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5513"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1540","reference_id":"RHSA-2012:1540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1540"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-29.html","reference_id":"XSA-29","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-29.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5513"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2534-cu4k-x3fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3907?format=json","vulnerability_id":"VCID-33gz-5ke6-zqdn","summary":"Several memory hypercall operations allow invalid extent order values","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"},{"reference_url":"http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5515.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5515","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33784","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34043","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34276","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33902","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33675","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33743","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5515"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515"},{"reference_url":"http://secunia.com/advisories/51397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51397"},{"reference_url":"http://secunia.com/advisories/51468","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51468"},{"reference_url":"http://secunia.com/advisories/51486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51486"},{"reference_url":"http://secunia.com/advisories/51487","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51487"},{"reference_url":"http://secunia.com/advisories/51495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51495"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80479","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80479"},{"reference_url":"http://support.citrix.com/article/CTX135777","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX135777"},{"reference_url":"http://www.debian.org/security/2012/dsa-2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2582"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/03/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/03/9"},{"reference_url":"http://www.osvdb.org/88127","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/88127"},{"reference_url":"http://www.securityfocus.com/bid/56798","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56798"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=877397","reference_id":"877397","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=877397"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5515","reference_id":"CVE-2012-5515","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5515"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0168","reference_id":"RHSA-2013:0168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0168"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-31.html","reference_id":"XSA-31","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-31.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5515"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-33gz-5ke6-zqdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3901?format=json","vulnerability_id":"VCID-cgf9-wy2g-y3eg","summary":"Grant table version switch list corruption vulnerability","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5510.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5510.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5510","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25728","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25958","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25848","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2598","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25879","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25831","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25759","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25601","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25668","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5510"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510"},{"reference_url":"http://secunia.com/advisories/51397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51397"},{"reference_url":"http://secunia.com/advisories/51468","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51468"},{"reference_url":"http://secunia.com/advisories/51486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51486"},{"reference_url":"http://secunia.com/advisories/51487","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51487"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80478","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80478"},{"reference_url":"http://support.citrix.com/article/CTX135777","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX135777"},{"reference_url":"http://www.debian.org/security/2012/dsa-2582","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2582"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/03/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/03/6"},{"reference_url":"http://www.osvdb.org/88128","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/88128"},{"reference_url":"http://www.securityfocus.com/bid/56794","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=877358","reference_id":"877358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=877358"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5510","reference_id":"CVE-2012-5510","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5510"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-26.html","reference_id":"XSA-26","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-26.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5510"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cgf9-wy2g-y3eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3902?format=json","vulnerability_id":"VCID-e7fa-udtd-eugj","summary":"several HVM operations do not validate the range of their inputs","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5511","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26072","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26088","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26029","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2601","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25865","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25815","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511"},{"reference_url":"http://secunia.com/advisories/51397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51397"},{"reference_url":"http://secunia.com/advisories/51486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51486"},{"reference_url":"http://secunia.com/advisories/51487","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51487"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80484","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80484"},{"reference_url":"http://support.citrix.com/article/CTX135777","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX135777"},{"reference_url":"http://www.debian.org/security/2013/dsa-2636","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2636"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/03/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/03/10"},{"reference_url":"http://www.osvdb.org/88129","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/88129"},{"reference_url":"http://www.securityfocus.com/bid/56796","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=877365","reference_id":"877365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=877365"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5511","reference_id":"CVE-2012-5511","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5511"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-27.html","reference_id":"XSA-27","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5511"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7fa-udtd-eugj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3904?format=json","vulnerability_id":"VCID-vcb4-ne2n-83hx","summary":"HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5512.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5512.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5512","reference_id":"","reference_type":"","scores":[{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24166","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24367","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24493","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2442","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24394","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24354","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24315","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24176","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24137","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24019","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.241","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5512"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512"},{"reference_url":"http://secunia.com/advisories/51397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51397"},{"reference_url":"http://secunia.com/advisories/51486","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51486"},{"reference_url":"http://secunia.com/advisories/51487","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51487"},{"reference_url":"http://secunia.com/advisories/55082","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55082"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201309-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201309-24.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80481","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80481"},{"reference_url":"http://support.citrix.com/article/CTX135777","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX135777"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/12/03/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/12/03/7"},{"reference_url":"http://www.osvdb.org/88132","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/88132"},{"reference_url":"http://www.securityfocus.com/bid/56799","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/56799"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=877385","reference_id":"877385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=877385"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:citrix:xenserver:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5512","reference_id":"CVE-2012-5512","reference_type":"","scores":[{"value":"3.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5512"},{"reference_url":"https://security.gentoo.org/glsa/201309-24","reference_id":"GLSA-201309-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-24"},{"reference_url":"https://xenbits.xen.org/xsa/advisory-28.html","reference_id":"XSA-28","reference_type":"","scores":[],"url":"https://xenbits.xen.org/xsa/advisory-28.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/943279?format=json","purl":"pkg:deb/debian/xen@4.1.3-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943265?format=json","purl":"pkg:deb/debian/xen@4.14.6-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1tb8-t91c-63bp"},{"vulnerability":"VCID-26a9-9zz3-wfhh"},{"vulnerability":"VCID-2trm-w3ww-cfhk"},{"vulnerability":"VCID-3bw4-631f-e7h6"},{"vulnerability":"VCID-3se4-qv6j-xqfq"},{"vulnerability":"VCID-3vdg-5g64-wkbt"},{"vulnerability":"VCID-46ad-1k9n-j3hm"},{"vulnerability":"VCID-4cdt-ycjx-6ub4"},{"vulnerability":"VCID-4k7p-3g95-n7dm"},{"vulnerability":"VCID-4pra-prf3-1uff"},{"vulnerability":"VCID-4rmg-db7g-u3hs"},{"vulnerability":"VCID-5ktg-bhh1-ubbz"},{"vulnerability":"VCID-5u88-jt28-cfb6"},{"vulnerability":"VCID-6dax-cddv-7bbs"},{"vulnerability":"VCID-6jqj-2qwn-8qd9"},{"vulnerability":"VCID-8k1q-b2kj-w7hh"},{"vulnerability":"VCID-8tv5-zxmm-r3fk"},{"vulnerability":"VCID-97zm-r9b6-uqdu"},{"vulnerability":"VCID-b57c-x3pw-7fb7"},{"vulnerability":"VCID-bhdk-jmss-4qc8"},{"vulnerability":"VCID-byu1-7n9c-5fes"},{"vulnerability":"VCID-c4xu-szkm-1kh6"},{"vulnerability":"VCID-ee3z-24pr-kqcm"},{"vulnerability":"VCID-ejhc-6yqt-gkgv"},{"vulnerability":"VCID-evcg-2z3p-gbch"},{"vulnerability":"VCID-h9hz-vur7-kyhg"},{"vulnerability":"VCID-j22f-mbqe-a7dk"},{"vulnerability":"VCID-p2fk-8snj-x7dy"},{"vulnerability":"VCID-psaa-jdr7-e3fm"},{"vulnerability":"VCID-q3p3-tgay-6kcs"},{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-rdub-9bhg-nbc6"},{"vulnerability":"VCID-rk2f-yqbb-nyd2"},{"vulnerability":"VCID-rt5n-e4wq-p3gh"},{"vulnerability":"VCID-tjgh-waa3-wqgk"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-uv8m-bj4c-8fes"},{"vulnerability":"VCID-vv23-mvyn-87hg"},{"vulnerability":"VCID-wd4s-jxuf-skbp"},{"vulnerability":"VCID-wz1m-aeaf-nkg7"},{"vulnerability":"VCID-xqpz-y83m-4uc4"},{"vulnerability":"VCID-ye1t-qhtx-sucm"},{"vulnerability":"VCID-z9rm-9p2q-wfag"},{"vulnerability":"VCID-zkeg-d5d5-vbda"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.14.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943263?format=json","purl":"pkg:deb/debian/xen@4.17.5%2B72-g01140da4e8-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qpfc-3296-9ub3"},{"vulnerability":"VCID-upju-tcz7-efg1"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.17.5%252B72-g01140da4e8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943267?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-0%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/943266?format=json","purl":"pkg:deb/debian/xen@4.20.2%2B37-g61ff35323e-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-qsma-2ufh-jybe"},{"vulnerability":"VCID-wx6w-6y5m-fugn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.20.2%252B37-g61ff35323e-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5512"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vcb4-ne2n-83hx"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/xen@4.1.3-5%3Fdistro=trixie"}